rfc8681.txt   rfc8681.txt 
skipping to change at line 74 skipping to change at line 74
3. Common Procedures 3. Common Procedures
3.1. Codec Parameters 3.1. Codec Parameters
3.2. ADU, ADUI, and Source Symbols Mappings 3.2. ADU, ADUI, and Source Symbols Mappings
3.3. Encoding Window Management 3.3. Encoding Window Management
3.4. Source Symbol Identification 3.4. Source Symbol Identification
3.5. Pseudorandom Number Generator (PRNG) 3.5. Pseudorandom Number Generator (PRNG)
3.6. Coding Coefficients Generation Function 3.6. Coding Coefficients Generation Function
3.7. Finite Field Operations 3.7. Finite Field Operations
3.7.1. Finite Field Definitions 3.7.1. Finite Field Definitions
3.7.2. Linear Combination of Source Symbol Computation 3.7.2. Linear Combination of Source Symbol Computation
4. Sliding Window RLC FEC Scheme over GF(2^(8)) for Arbitrary 4. Sliding Window RLC FEC Scheme over GF(28) for Arbitrary Packet
Packet Flows Flows
4.1. Formats and Codes 4.1. Formats and Codes
4.1.1. FEC Framework Configuration Information 4.1.1. FEC Framework Configuration Information
4.1.2. Explicit Source FEC Payload ID 4.1.2. Explicit Source FEC Payload ID
4.1.3. Repair FEC Payload ID 4.1.3. Repair FEC Payload ID
4.2. Procedures 4.2. Procedures
5. Sliding Window RLC FEC Scheme over GF(2) for Arbitrary Packet 5. Sliding Window RLC FEC Scheme over GF(2) for Arbitrary Packet
Flows Flows
5.1. Formats and Codes 5.1. Formats and Codes
5.1.1. FEC Framework Configuration Information 5.1.1. FEC Framework Configuration Information
5.1.2. Explicit Source FEC Payload ID 5.1.2. Explicit Source FEC Payload ID
skipping to change at line 102 skipping to change at line 102
7.1. Attacks Against the Data Flow 7.1. Attacks Against the Data Flow
7.1.1. Access to Confidential Content 7.1.1. Access to Confidential Content
7.1.2. Content Corruption 7.1.2. Content Corruption
7.2. Attacks Against the FEC Parameters 7.2. Attacks Against the FEC Parameters
7.3. When Several Source Flows are to be Protected Together 7.3. When Several Source Flows are to be Protected Together
7.4. Baseline Secure FEC Framework Operation 7.4. Baseline Secure FEC Framework Operation
7.5. Additional Security Considerations for Numerical 7.5. Additional Security Considerations for Numerical
Computations Computations
8. Operations and Management Considerations 8. Operations and Management Considerations
8.1. Operational Recommendations: Finite Field GF(2) Versus 8.1. Operational Recommendations: Finite Field GF(2) Versus
GF(2^(8)) GF(28)
8.2. Operational Recommendations: Coding Coefficients Density 8.2. Operational Recommendations: Coding Coefficients Density
Threshold Threshold
9. IANA Considerations 9. IANA Considerations
10. References 10. References
10.1. Normative References 10.1. Normative References
10.2. Informative References 10.2. Informative References
Appendix A. TinyMT32 Validation Criteria (Normative) Appendix A. TinyMT32 Validation Criteria (Normative)
Appendix B. Assessing the PRNG Adequacy (Informational) Appendix B. Assessing the PRNG Adequacy (Informational)
Appendix C. Possible Parameter Derivation (Informational) Appendix C. Possible Parameter Derivation (Informational)
C.1. Case of a CBR Real-Time Flow C.1. Case of a CBR Real-Time Flow
 End of changes. 2 change blocks. 
3 lines changed or deleted 3 lines changed or added

This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/